For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.
Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.
There’s a big push for SBOMs (software bills of material) as it’s becoming clear how crucial they are to cybersecurity. Read our guidebook to learn everything about SBOMs, including what they are and why they’re necessary, and how they work.
It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.
In episode 31, Chris Hughes explains the NSA’s recent release of software supply chain security guidance for developers.
Data loss prevention policies sound good on the surface, but dig deeper and you’ll find that they come with unexpected risks. Analyst Robert Wood explains what these risks are and how to avoid them.
In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
In Cybersecurity Minute, Ep. 31, Chris Hughes says it’s clear that the Senate’s Securing Open Source Software Act emphasizes how critical open-source software is to national security and society.
Bill Doerrfeld shares tips that help address the unique cybersecurity implications of deploying and managing software across various cloud-based environments.
In this Data Revolution Minute, Pablo Moreno explains Google’s release of TensorStore, which is a framework designed to hold and process N-dimensional data. He says this is a perfect solution for training AI.
In this Cloud Wars Expo Moment, Chris Hughes explains why the user experience should inform the systems designed by cybersecurity professionals.
“Set it and forget it” assumptions can be dangerous when it comes to security. That’s why it’s important for users to understand everything their cloud tools can and cannot do.
With the ability to enforce data access policies on a platform agnostic basis, Okera simplifies data analytics access management.
Startup Okera takes a centralized approach to managing access to analytics data. Customers validate the software provides massive scalability.
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
As Chris Hughes explains, the recent U.S. government response to increased software supply chain attacks will force the cybersecurity industry to innovate.
Analyst Wayne Sadin offers ways for legacy organizations to update their data strategy so that they can keep up with cloud native organizations.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
Government is yet another area in need of more accessible software development to upkeep the well-being of communities. Bill Doerrfeld explains how low-code/no-code could be the answer.